#1 Wireless Hacking Tools 2011 - KL

Wireless Hacking Tools 2011 | 156.63 MB1: Wireless hacking tool AIO 2009 edition with a few tweaks by tweaker so updated to 20112:Airodump and Airongcrack etc. to get WEP and WPA password3:WiPhire

airodump is an 802.11 packet capture program that is designed to "capture as much encrypted traffic as possible...each WEP data packet has an associated 3-byte Initialization Vector (IV): after a sufficient number of data packets have been collected, run aircrack on the resulting capture file. aircrack will then perform a set of statistical attacks developed by a talented hacker named KoreK."

WiPhire is a Bash script aimed at making the Wireless Hacking process a lot easier. This script was written on Backtrack 4 and designed to be used with Backtrack 4. This script was also designed to be used with the Alfa AWUS036H Wireless adapter with the RTL8187 chipset. If you do not have this chipset but another adapter that is compatible with the aircrack-ng suite you will need to put it into monitor mode prior to running the script if you wish to use an option that needs monitor mode enabled. This script needs to be ran as root.

Certified Ethical Hacker Certification from Specialized Solutions enables the system administrator with critical information to identify, counter and stop or defend hackers from penetrating the corporate network. With this certification, you will begin to understand how a hacker thinks and what tactics they use to penetrate corporate networks. This allows system administrators to deploy proactive countermeasures and stay ahead of information security developments and exploited vulnerabilities.The Certified Ethical Hacker Training Solution from Specialized Solutions explores the existence and the use of hacking tools and security systems across 21 topical domains.

#8 Hacker Conference The Next Hope 2010 - Video

This year, the talks were especially interesting, provocative, engaging, and enlightening. This is a great way to comfort yourself if you didnít make it to this historic conference and a means of seeing even more talks if you did happen to make it this time. Please help us spread the word so that more people have the HOPE experience!

#13 Exosyphen Studios Hacker Evolution v1.00.0096

#14 Hotspot Shield 1.51

23-09-2010, 10:15

Hotspot Shield 1.51 | 5.25 MB

Reliable Wi-Fi Security, 100% Security Through a VPN! Sure, public Wi-Fi hotspots are great. After all, what would life be without checking your email each morning at your favorite cafe? But while you're enjoying your latte and a bagel, some hacker might be accessing your passwords, credit card numbers, sensitive company data and much more. And standard antivirus software won't protect you. That's why AnchorFree is pleased to offer Hotspot Shield. This free security software keeps your Internet connection secure at public hotspots, home or work.

#15 WiFi Slax Wireless Hacking Live-CD v3.1 + Plugins Updated

8-11-2010, 13:16

WiFi Slax Wireless Hacking Live-CD v3.1 + Plugins Updated

WiFi Slax Wireless Hacking Live-CD v3.1 + Plugins Updated | 635.24 MB

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver. Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of strong encryption while a 128 bit key has 104. The IV is placed in encrypted frames header, and is transmitted in plain text.

#17 WiFi Slax Wireless Hacking Live-CD v3.1 + Plugins Updated

8-11-2010, 14:22

WiFi Slax Wireless Hacking Live-CD v3.1 + Plugins Updated | 635.24 MB

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver. Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of strong encryption while a 128 bit key has 104. The IV is placed in encrypted frames header, and is transmitted in plain text.

#18 Hotspot Shield 1.49

30-08-2010, 14:47

Hotspot Shield 1.49 | 5.2 MB

Free, Reliable Wi-Fi Security, 100% Security Through a VPNSure, public Wi-Fi hotspots are great. After all, what would life be without checking your email each morning at your favorite cafe? But while you're enjoying your latte and a bagel, some hacker might be accessing your passwords, credit card numbers, sensitive company data and much more. And standard antivirus software won't protect you. That's why AnchorFree is pleased to offer Hotspot Shield. This free security software keeps your Internet connection secure at public hotspots, home or work.

Frendly Sites

Category

Top News

This site does not store any files on its server. We only index and link to content provided by other sites.
If you have any doubts about legality of content or you have another suspicions,
feel free to Contact Us.